Nyoogle Redirect — How to Remove It Completely from Your Browser

Nyoogle Redirect — How to Remove It Completely from Your Browser

how to remove Nyoogle redirect stf

Security experts note that a new wave of malware browser extensions have been plagued computer users around the world. The Nyoogle redirect (known under its full name Nyoogle – Custom Logo for Google) has been found to be among the newly released viruses targeting end users. It is able to misconfigure the victim applications and cause a lot of security and privacy activities including the delivery of other threats.

Threat Summary

TypeBrowser Hijacker, PUP
Short DescriptionThe redirect can change the homepage, search engine and new tab on each browser installed on the compromised machine.
SymptomsDepending on the exact redirect configuration different behaviour patterns can be executed. The list includes user redirection, malware infections and etc.
Distribution MethodFreeware Installations, Bundled Packages
Detection Tool See If Your System Has Been Affected by Nyoogle


Malware Removal Tool

User ExperienceJoin Our Forum to Discuss Nyoogle.

Nyoogle Redirect – Distribution

The primary distribution technique used by the Nyoogle redirect is the creation of dangerous copies of it in the official software repositories of the most popular web browsers. The fact that the malware group behind it have created versions for the most popular applications shows that their intentions are to impact as many users as possible. Such is the case of this particular threat as it has been made compatible with the most poopular applications: Mozilla Firefox, Google Chrome, Opera, Safari, Microsoft Edge and Internet Explorer.

It is being advertised as quick and easy Google logo changer. A sample description reads the following:

Replace the Google logo with any logo !
Hey, do you want to change the Google logo? Do it now with Nyoogle !
Custom text, custom image :)

– Google Nyoogle : Custom Logo for Google Chrome
– Extension for fun only, free to use.

Another strategy that is often employed in similar cases is the distribution of malware software installers. These bundles are contain legitimate installers taken from the official software providers and then modified to include the Nyoogle redirect code. In some cases it may be possible to disallow the installation if the victims uncheck certain options during the setup process.

Email messages that use templates may be used in order to deliver the attacks in multiple ways. Social engineering is almost always used and there are three primary ways of infecting users via this method:

  • Hyperlinks —The messages can contain links to hosted instances of the Nyoogle redirect. They can be disguised as useful software or other files that the users may find interesting.
  • File Attachments — The installers can be bundled directly to the messages either as setup files or archives.
  • Infected Documents — The criminals behind the attack can create documents in different formats: rich text documents, spreadsheets, presentations. Once they are opened by the computer users a notification prompt appears which asks them to enable the built-in macros (scripts). If this is done the malware is downloaded from the Internet anad executed directly.

The Nyoogle redirect infections can also be acquired from web scripts that are often part of hacker-controlled sites. They can have many forms including pop-ups, banners, redirects and scripts. By interacting with such elements the victims can get infected with the dangerous code.

Nyoogle Redirect – In Detail

The Nyoogle redirect has been found to contain various browser hijacker behavior patterns. Depending on its exact configuration it may alter some of the basic web browser settings including the default home page, search engine and new tabs page. Such modifications are done in order to redirect the users to a hacker-controlled page. As a consequence dangerous can be instituted on the victims. They monitor the users behavior, interests and habits and report the data to the hacker operators. Usually such sites are usually created as part of a network and the acquired data is pooled into a large database that can generate a complete profile of the victim users. There are two primary types of information:

  • Anonymous Data — This category represents represents statistical information such as the type of web browser and version impacted.
  • Personally-Identifiable Information — The harvested data of this type can directly expose the victims identity. As the infections happen from the browsers the hackers gain access to the stored history, cookies, bookmarks, preferences, account credentials and passwords.

Advanced configuration and hacker tactics can use the existing infection to deliver additional malware to the compromised computers. This is an effective solution when the operators plan a complex infection. In such cases system changes can follow that can impact the operating system as a whole. This can result in modifications to important configuration files, boot options and the Windows registry.

The existing Nyoogle redirect has been found to execute malware JavaScript code. As a result code can be downloaded from third-party sites and the criminal operators can inject and execute commands at will. This is achieved through a C&C servers connection is controlled by the hackers. In certain situations it can also be used to install a Trojan component. It allows the hackers to spy on the user in real time as well as overtake control of the machines at any given time.

The Nyoogle redirect has also been found to modify the proxy settings. As a result all Internet traffic is relayed through a hacker-controlled server. This gives the hackers the ability to execute Man-in-the-middle attacks and traffic manipulation.

During the investigation the experts discovered other similar threats that operate in roughly the same manner. It is believed that the same hacker or criminal group are behind them — the Lite Bookmarks browser hijacker (associated with the lite-bookmarks [dot] info domain) and the Stickies – Chrome’s Post-it Notes (Google Chrome extension associated with the stickies [dot] pro domain).

How to Remove Nyoogle Redirect

The detailed guide below shows how to remove Nyoogle redirect from all affected browsers and from the PC. In some cases, the manual removal may not be enough to eliminate completely the hijacker. So be advised to run a scan with an advanced anti-malware tool. It will locate all leftovers so you can easily delete them with a few mouse clicks. Furthermore, an active anti-malware tool on the system guarantees its protection from future malware infections.


Martin Beltov

Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.

More Posts - Website

Follow Me:
TwitterGoogle Plus

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share